Glossary- K Flashcards Preview

CISA > Glossary- K > Flashcards

Flashcards in Glossary- K Deck (26):
1

key

See encryption key.

2

keycard system

A physical access control system where personnel are able to enter a workspace by waving a keycard near a reader or inserting it into a reader, activating a door lock to briefly unlock the door.

3

key compromise

Any unauthorized disclosure or damage to an encryption key. See also key management.

4

key custody

The policies, processes, and procedures regarding the management of keys. See also key management.

5

key disposal

The process of decommissioning encryption keys. See also key management.

6

key exchange

A technique that is used by two parties to establish a symmetric encryp-
tion key when no secure channel is available.

7

key fingerprint

A short sequence of characters that is used to authenticate a public key.

8

key generation

The initial generation of an encryption key. See also key management.

9

key length

This refers to the size (measured in bits) of an encryption key. Longer en- cryption keys mean that it takes greater effort to successfully attack a cryptosystem.

10

key logger

A hardware device or a type of malware where a user’s keystrokes and, op- tionally, mouse movements and clicks are recorded and sent to the key logger’s owner.

11

key management

The various processes and procedures used by an organization to generate, protect, use, and dispose of encryption keys over their lifetime.

12

key protection

All means used to protect encryption keys from unauthorized disclo- sure and harm. See also key management.

13

key rotation

The process of issuing a new encryption key and re-encrypting data pro- tected with the new key. See also key management.

14

known error

An incident that has been seen before and its root cause is known.

15

laptop computer

A portable computer used by an individual user.

16

Layer 2 Tunneling Protocol (L2TP)

A TCP/IP tunneling protocol.

17

layer 3 switch

A device that routes packets between different TCP/IP networks.

18

layer 4 switch

A device used to route packets to destinations based on TCP and UDP port numbers.

19

layer 4-7 switch

A device that routes packets to destinations based on their internal content.

20

least privilege

The concept where an individual user should have the lowest privilege possible that will still enable them to perform their tasks.

21

Lightweight Directory Access Protocol (LDAP)

A TCP/IP application layer protocol used as a directory service for people and computing resources.

22

link

Layer 1 of the TCP/IP network model. The purpose of the link layer is the delivery of messages (usually called frames) from one station to another on a local network. See also TCP/IP network model.

23

local area network (LAN)

A network that connects computers and devices together in a small building or a residence.

24

logic bomb

A set of instructions that is designed to perform some damaging action when a specific event occurs; a popular example is a time bomb that alters or destroys data on a specified date in the future.

25

logical network architecture

The part of network architecture concerned with the depiction of network communications at a local, campus, regional, and global level.

26

loopback address

The IP address 127.0.0.1 (or any other address in the entire 127 ad- dress block). A packet sent to a loopback address is sent to the station that originated it.